Which of the following techniques can be used to mitigate the risk of an on-site attacker from connecting to an unused network port and gaining full access to the network?

Which of the following techniques can be used to mitigate the risk of an on-site attacker from
connecting to an unused network port and gaining full access to the network? (Choose three.)

Which of the following techniques can be used to mitigate the risk of an on-site attacker from
connecting to an unused network port and gaining full access to the network? (Choose three.)

A.
Port Security

B.
IPSec Encryption

C.
Network Admission Control (NAC)

D.
802.1q Port Based Authentication

E.
802.1x Port Based Authentication

F.
Intrusion Detection System (IDS)



Leave a Reply 0

Your email address will not be published. Required fields are marked *